Latest Podcast



Featured Articles

Friday, March 8, 2013

4 mobile security tips for every smartphone owner

Satish Shetty of Codeproof Technologies writes:

Don’t underestimate the security of your smartphone. Here are 4 important but easy security tips to secure your iPhone, iPad, Android phone and Tablet devices.

1. Protecting Your Phone From Unauthorized Access

Image

The most important thing is to make sure you have a passcode lock on your phone, and to not share this passcode with anyone else. According to data from Codeproof, more than 50% of smartphones don’t have a passcode lock. For better protection, the passcode must be at least 6 letters and numbers in length. A longer passcode makes it even harder for a stranger to hack into your phone.

In the iPhone, open “Settings” app and select “General” and then scroll down and select “Passcode Lock”. Tap “Turn Passcode on” and enter your password. Also turn off “Simple Passcode”. This way you can have passcode with both number and letters. Also “Require Passcode” set to “Immediately” so that the device gets locked immediately when it is idle.

Image

Make sure you turn on “Erase Data” at the bottom of the screen so that if an intruder tries to hack your passcode to get into the device, the phone automatically erases all the contents and goes to factory default mode.

If you want to configure passcode settings on multiple devices at once, you can use a Mobile Device Management (MDM) software such as Codeproof to do that remotely.

2. Locating Your Missing Phone

Almost all available smartphones have a GPS location tracking feature built-in. However you must enable it and make sure you can remotely track it before the device is lost or stolen.

In an iPhone or iPad, you can use the Find My iPhone App to locate your missing iPhone or iPad. Alternatively you can use the Codeproof app to locate your iPhone, iPad, Android Phone and Tablet devices.

3. Do not Jailbreak Your Phone

Jailbreaking lets you to install apps from third-party appstores - but you have to pay price for your freedom. Because mobile operating systems are designed with built-in security, jailbreaking a mobile device compromises the OS security model and opens data to exploitation. Jailbroken phones are therefore also more vulnerable to external attacks. You can use Codeproof App to check if your phone is jailbroken or not.

4. Ability to Delete Emails and Photos from Phone When Lost or Stolen

In case your phone is lost or stolen, you may try to locate it first. if you can’t locate it, you should send a DATA WIPE command to wipe all the contents in the phone. This way an intruder won’t be able to access your personal and corporate emails or photos.

Pretty much all the smartphones have an ability to delete all the contents in the device with a command. In iPhone, using Find My iPhone app you can do this but make sure you setup that app before you lose your phone. Alternatively using the Codeproof web console, you can remotely issue a DATA WIPE command to clear all contents in the lost or stolen device.

Image
Satish Shetty is the founder & CEO of Codeproof Technologies, a mobile security startup based in the American city of Redmond, WA. Described as a technology visionary, he has more than 18 years of experience in developing software at companies like Microsoft and McAfee.
Print
Author: The Fonecast
0 Comments
Rate this article:
5.0

Leave a comment

This form collects your name, email, IP address and content so that we can keep track of the comments placed on the website. For more info check our Privacy Policy and Terms Of Use where you will get more info on where, how and why we store your data.
Add comment

Opinion Articles

How the right mobile phone technology can turn anyone into a spy

Mark Bridge writes:

A few weeks ago I received a phone call out of the blue. It went something like this:
“I think my partner's cheating on me. How can I get into the GPS on his phone to find out where he is?”

I'm no secret agent. Nevertheless, it got me thinking.

Author: The Fonecast
1 Comments
Article rating: No rating

To SIM or not to SIM; that is the question

Mark Bridge writes:

The last couple of weeks have seen the ‘embedded SIM’ making headlines.

The term ‘embedded SIM’ has previously been used to describe non-phone equipment with a SIM card pre-installed in a built-in 3G modem. Technically the modem was embedded, not the SIM – but it looks as though genuinely embedded SIMs could be just around the corner.

Author: The Fonecast
0 Comments
Article rating: No rating

How we could use mobile technology to destroy personal privacy

Mark Bridge writes:

Head to any major city, look around and you’ll see tourists recording their visit. Some have digital cameras, some have phones and some are shooting video.

It’s the same kind of scene when you go to a concert. The performer on stage will be looking at a sea of blue faces, all illuminated by their smartphones. This, I reckon, could be the beginning of the end of privacy.

Author: The Fonecast
0 Comments
Article rating: No rating

What's the value of mHealth?

James Rosewell writes:

Any healthcare solution involving some component of mobile technology seems to come under the banner mHealth. A solution that captures information about diabetes sufferers' blood sugar levels via prompted text messages and relays this information to a physician would be considered mHealth. Providing feedback to the diabetes patient about a change in dosage following review by the physician makes the solution even better. Linking devices that automatically monitor blood sugar levels and dispense insulin involving a remote computer and physician to monitor the real-time situation moves the solution on a level still. All these examples show how mobile technology can be used to improve quality of life.

Author: The Fonecast
0 Comments
Article rating: No rating

How to mess up a customer relationship with SMS marketing

Mark Bridge writes:

Do you want to know how to foul up your customer relationships?  How to use mobile marketing to reduce customer loyalty?  Then gather around, dearly beloved, for I have a case study you're sure to appreciate.

Author: The Fonecast
0 Comments
Article rating: No rating
RSS
First8889909193959697Last

Recent Podcasts

Reviewing our 2015 mobile industry predictions... and looking forward to 2016

Podcast - 15th January 2016

Iain Graham, James Rosewell and Mark Bridge return to review their mobile industry predictions from last year. Which mergers, partnerships and developments did they forecast correctly... and which didn’t work out as planned?

Later in the programme, the team anticipates some of the topics that will be hitting the headlines during 2016.

Author: The Fonecast
0 Comments
Article rating: No rating

Podcast from Mobile World Congress 2015

Podcast - 6th March 2015

Mark Bridge learns about the mobile technology trends at Mobile World Congress 2015 by chatting to James Rosewell of 51Degrees, Dr Kevin Curran from the IEEE and Chris Millington of Doro.

They talk about wearable devices, wireless charging, mobile operating systems and much more... including some of their favourite products from the exhibition.

Author: The Fonecast
0 Comments
Article rating: No rating

Looking back at February: from security scares to multiple MVNOs

Podcast - 27th February 2015

We're taking a look back at the biggest mobile industry news stories from February 2015, including allegations that the UK's security service tried to breach SIM card security by hacking into one of the world's biggest SIM producers.

We also talk about the planned BT and EE merger, the creation of two new UK virtual networks, some acquisitions in the mobile payment arena and a new Ubuntu smartphone.

Author: The Fonecast
0 Comments
Article rating: No rating

Interview with Chris Millington of Doro about mobile retailing, wearables and technology for older consumers

Podcast - 24th February 2015

In today's programme Mark Bridge talks to Chris Millington, who's Managing Director for Doro UK and Ireland.

They discuss the state of mobile retailing in the UK, the future of wearable devices and - as you might expect - smartphones for seniors.

Author: The Fonecast
0 Comments
Article rating: No rating

A month of mobile: O2 counts on 3, Microsoft counts to 10 and Apple counts its profits

Podcast - 30th January 2015

We're back with a month of mobile industry news, including takeover talks and takeover rumours. O2 and Three are said to be discussing a merger... but is there any truth in the suggestions that BlackBerry could be up for grabs?

We also discuss Apple's record-breaking quarterly figures, the highlights of CES and the launch of Microsoft Windows 10, as well as saying farewell to the current version of Google Glass.

Author: The Fonecast
0 Comments
Article rating: No rating
RSS
12345678910Last

Follow thefonecast.com

Twitter @TheFonecast RSS podcast feed
Find us on Facebook Subscribe free via iTunes

Archive Calendar

«June 2025»
MonTueWedThuFriSatSun
2627282930311
2345678
9101112131415
16171819202122
23242526272829
30123456

Archive

Terms Of Use | Privacy Statement